Noncoherent Capacity of Secret-Key Agreement With Public Discussion
نویسندگان
چکیده
منابع مشابه
Secret key agreement by public discussion from common information
The problem of generating a shared secret key S by two parties knowing dependent random variables X and I’, respectively, but not sharing a secret key initially, is considered. An enemy who knows the random variable 2, jointly distributed with X and Y according to some probability distribution PXYZ, can also receive all messages exchanged by the two parties over a public channel. The goal of a ...
متن کاملSecret-Key Reconciliation by Public Discussion
Assuming that Alice and Bob use a secret noisy channel (modelled by a binary symmetric channel) to send a key, reconciliation is the process of correcting errors between Alice's and Bob's version of the key. This is done by public discussion, which leaks some information about the secret key to an eavesdropper. We show how to construct protocols that leak a minimum amount of information. Howeve...
متن کاملMultiterminal Secret Key Agreement at Asymptotically Zero Discussion Rate
In the multiterminal secret key agreement problem, a set of users want to discuss with each other until they share a common secret key independent of their discussion. We want to characterize the maximum secret key rate, called the secrecy capacity, asymptotically when the total discussion rate goes to zero. In the case of only two users, the capacity is equal to the Gács–Körner common informat...
متن کاملInformation-theoretically Secure Secret-key Agreement by Not Authenticated Public Discussion 1
All information-theoretically secure key agreement protocols (e.g. based on quantum cryptography or on noisy channels) described in the literature are secure only against passive adversaries in the sense that they assume the existence of an authenticated public channel. The goal of this paper is to investigate information-theoretic security even against active adversaries with complete control ...
متن کاملSecret-key agreement over unauthenticated public channels III: Privacy amplification
This is the third part of a three-part paper on secret-key agreement secure against active adversaries. Here, we consider the special case where the legitimate partners already share a mutual string which might, however, be partially known to the adversary. The problem of generating a secret key in this case has been well studied in the passive-adversary model—for instance in the context of qua...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2011
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2011.2158999